web analytics
Categories
Uncategorized

Collusion of Big Tech, Big Finance, and Big Gov: A Tell From Online Services

stock here: All the Microsoft products are inherently now designed to spy on you, fully. Even the push for EVERYTHING to be default uploaded to the SECURE “Cloud” is amazing. Maybe I need to create a new Meme, a humans right to not be pushed towards spying and intrusion. An online Bill of Rights. I wonder if AI can run with this? At the bottom is today’s screen capture from one of my insurance companies that is forcing me to use un-secure, spying browsers.

prompt: Create a 3 page Cyber Bill Of Rights for all persons to be secure in their papers (link to constitution, pull the exact language). Basics will be preventing any information from being directed to online storage, and there shall be no need to “Opt Out”. Being out is the default and agreeing to allow some information to be stored online shall be a multi-step process in which the person shall be totally informed about the dangers of online storage, and a risk assessment of the benefits (small) versus the risks (large). There shall be no 2 Factor “authorization” which is not directly linked to financial or health information, in which said authorization would link a persons online actions, thoughts, comments, to the actual person via say their phone number which was linked via a 2 factor confirmation type of event. Those in a broad range of fields, but specifically now mentioning Financial (and this definitely include insurance) or Health shall be required to have their online functions, function on a broad range of browsers, not just the spying browsers from Microsoft. There shall be no “apps” aka computer programs that function only on smart phones, they shall all be required to function on tablets and workstations to avoid the push to have every function of your life be on your cell phone, thus allowing tracking of position and events. Any organization storing personal information, shall be responsible, up to criminal and civil liabilities for their failure to secure the data, up to and including inside stealing of such data. i.e. don’t store any personal information unless there is a critical need, and all these companies and persons must protect it. There shall be strict penalties similar to Federal Code 18-242 which provides penalties that match that harm that has been caused or could have been caused by “Deprivation of rights under the color of law”. The Cyber Bill of Rights shall be broader than 18-242, because it will not just function at the Federal level but at all levels of government and all Non-Governmental Organizations that receive Governmental funding. I would like AI to come up with 4 additional features of protection of individuals rights, privileges, privacy, and security. The doxxing of any individual shall be covered in this Cyber Bill of Rights, with strict penalties as there are many deranged authoritarian types that believe that their actions in attacking or otherwise harming others, is justified by their mistaken sense of righteousness.

Und so it begins………………

Cyber Bill of Rights

Preamble

In recognition of the rapid advancements in technology and the increasing reliance on digital platforms, it is imperative to ensure that the rights, privileges, privacy, and security of individuals are protected. This Cyber Bill of Rights establishes fundamental principles to safeguard personal information, prevent unauthorized online storage, and ensure informed consent in digital interactions. This document draws inspiration from the Fourth Amendment of the United States Constitution, which guarantees the right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures.

Section 1: Right to Privacy in Digital Communications

1.1 Default Non-Storage of Personal Information

All personal information shall be protected from being directed to online storage without explicit, informed consent. The default position shall be non-storage, requiring no action to “opt-out.” Individuals must actively “opt-in” to allow any personal information to be stored online through a multi-step process that ensures complete transparency regarding the risks and benefits involved.

1.2 Informed Consent and Risk Assessment

Before consenting to the storage of personal information online, individuals must be provided with a comprehensive risk assessment. This assessment shall outline the potential dangers of online storage and weigh them against any benefits. The process must ensure that individuals are fully informed and make decisions with a clear understanding of the implications.

1.3 Limitation on Two-Factor Authentication

Two-factor authentication (2FA) shall only be mandated for accessing financial or health-related information. Under no circumstances shall 2FA be used to link an individual’s online actions, thoughts, or comments to their actual identity through methods such as phone number verification unless directly related to financial or health security.

Section 2: Accessibility and Security of Digital Services

2.1 Browser Compatibility and Inclusivity

Digital services, especially those related to financial and health sectors, must be compatible with a broad range of web browsers. This ensures that users are not forced to use specific browsers that may compromise their privacy. Services shall not be limited to browsers developed by companies known for invasive data practices.

2.2 Multi-Platform Functionality

All applications, particularly those storing or handling personal information, must function across various devices, including tablets and workstations. This requirement prevents the monopolization of services on smartphones, which often track users’ locations and activities.

2.3 Liability for Data Breaches

Organizations storing personal information shall bear full responsibility for securing such data. This includes accountability for internal theft. Failure to protect personal data shall result in both civil and criminal liabilities. Personal information shall only be stored when critically necessary, and stringent measures must be taken to safeguard it.

2.4 Penalties for Violations

Strict penalties shall be imposed for violations of this Cyber Bill of Rights, akin to those under Federal Code 18-242, which addresses the deprivation of rights under the color of law. These penalties shall reflect the harm caused or potential harm that could have been caused by breaches of digital privacy and security. The Cyber Bill of Rights shall extend beyond the federal level to all levels of government and non-governmental organizations receiving government funding.

Section 3: Additional Protections

3.1 Right to Anonymity

Individuals shall have the right to remain anonymous in digital interactions unless there is a clear, lawful necessity to reveal their identity. This right ensures that individuals can freely express themselves online without fear of undue surveillance or retribution.

3.2 Protection Against Doxxing

The act of doxxing, or publicly revealing private information about an individual without their consent, shall be strictly prohibited. Violators shall face severe penalties to protect individuals from harassment, threats, and potential physical harm resulting from such actions.

3.3 Restriction on Data Mining and Profiling

Organizations shall be prohibited from mining data and creating detailed profiles of individuals without explicit consent. Any data collection must be transparent, and individuals must be informed of how their data will be used, with the option to refuse such practices.

3.4 Right to Data Portability and Deletion

Individuals shall have the right to request the transfer of their data to another service provider and the deletion of their data from any service without undue delay. This right ensures that individuals maintain control over their personal information and can prevent misuse by digital service providers.

3.5 Right to Encryption and Secure Communication

Individuals shall have the right to use strong encryption tools to protect their communications and personal information from unauthorized access. Service providers must offer end-to-end encryption for messaging and data storage, ensuring that only the intended recipients can access the content.

3.6 Transparency in Algorithmic Decision-Making

Organizations using algorithms to make decisions that affect individuals (such as in hiring, lending, or law enforcement) must provide transparency about how these algorithms function. Individuals have the right to understand how their data is being used and to contest decisions made by automated systems. Organizations must disclose the criteria and logic behind their algorithms, ensuring accountability and fairness.

3.7 Right to Digital Dignity

Individuals shall have the right to digital dignity, which includes the right to request the removal of any content that is harmful, defamatory, or violates their personal dignity from online platforms. Digital service providers must establish clear and efficient processes for individuals to report and remove such content, ensuring a respectful and safe online environment.

Conclusion

The Cyber Bill of Rights is a foundational document that enshrines the principles of privacy, security, and informed consent in the digital age. By establishing these protections, we aim to empower individuals to navigate the digital landscape safely and securely, ensuring their fundamental rights are respected and upheld.

One reply on “Collusion of Big Tech, Big Finance, and Big Gov: A Tell From Online Services”

Leave a Reply

Your email address will not be published. Required fields are marked *